A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems

被引:19
|
作者
Wilhjelm, Carl [1 ]
Younis, Awad A. [2 ]
机构
[1] Georgia State Univ, Atlanta, GA 30303 USA
[2] Northern Kentucky Univ, Highland Hts, KY USA
关键词
Adversarial Machine Learning; Security Requirements Engineering; Requirements Elicitation Using Threat Modeling; STRIDE; Attack Libraries; Model Inference and Perturbation and Evasion Attacks;
D O I
10.1109/QRS-C51114.2020.00078
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Machine learning (ML) models are now a key component for many applications. However, machine learning based systems (MLBSs), those systems that incorporate them, have proven vulnerable to various new attacks as a result. Currently, there exists no systematic process for eliciting security requirements for MLBSs that incorporates the identification of adversarial machine learning (AML) threats with those of a traditional non-MLBS. In this research study, we explore the applicability of traditional threat modeling and existing attack libraries in addressing MLBS security in the requirements phase. Using an example MLBS, we examined the applicability of 1) DFD and STRIDE in enumerating AML threats; 2) Microsoft SDL AI/ML Bug Bar in ranking the impact of the identified threats; and 3) the Microsoft AML attack library in eliciting threat mitigations to MLBSs. Such a method has the potential to assist team members, even with only domain specific knowledge, to collaboratively mitigate MLBS threats.
引用
收藏
页码:426 / 433
页数:8
相关论文
共 50 条
  • [41] Requirements Elicitation and Analysis of Multiagent Systems Using Activity Theory
    Fuentes-Fernandez, Ruben
    Gomez-Sanz, Jorge J.
    Pavon, Juan
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2009, 39 (02): : 282 - 298
  • [42] Security Threat Analysis of Automotive Infotainment Systems
    Takahashi, Junko
    Iwamura, Makoto
    Tanaka, Masashi
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [43] Computer information systems threat analysis on security
    Li, Y
    Wei, J
    INNOVATIONS THROUGH INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2004, : 951 - 953
  • [44] An extension of iStar for Machine Learning requirements by following the PRISE methodology
    Barrera, Jose M.
    Reina-Reina, Alejandro
    Lavalle, Ana
    Mate, Alejandro
    Trujillo, Juan
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [45] A methodology for the classification of quality of requirements using machine learning techniques
    Parra, Eugenio
    Dimou, Christos
    Llorens, Juan
    Moreno, Valentin
    Fraga, Anabel
    INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 67 : 180 - 195
  • [46] Quality Requirements Analysis with Machine Learning
    Tamai, Tetsuo
    Anzai, Taichi
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2018, : 241 - 248
  • [47] Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats
    Kim, Seung-Jun
    Lee, Seok-Won
    REQUIREMENTS ENGINEERING FOR INTERNET OF THINGS, 2018, 809 : 29 - 40
  • [48] A Machine Learning Based Methodology for Web Systems Codeless Testing with Selenium
    Nguyen, Phuc
    Maag, Stephane
    SOFTWARE TECHNOLOGIES (ICSOFT 2020), 2021, 1447 : 184 - 202
  • [49] Dealing with Explainability Requirements for Machine Learning Systems
    Li, Tong
    Han, Lu
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 1203 - 1208
  • [50] A review on security analysis of cyber physical systems using Machine learning
    Ahmed Jamal A.
    Mustafa Majid A.-A.
    Konev A.
    Kosachenko T.
    Shelupanov A.
    Materials Today: Proceedings, 2023, 80 : 2302 - 2306